Crea il mio profilo
Accesso pubblico
Visualizza tutto23 articoli
8 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Robert H. DengSingapore Management UniversityEmail verificata su smu.edu.sg
- Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityEmail verificata su rmit.edu.au
- Yingjiu LiRipple Professor, Computer Science Department, University of OregonEmail verificata su uoregon.edu
- Surya NepalCSIRO’s Data61, AustraliaEmail verificata su csiro.au
- Zhiguo WanPrincipal Investigator at Zhejiang Lab, Hangzhou, ChinaEmail verificata su zhejianglab.com
- Yi MuProfessorEmail verificata su cityu.mo
- Guilin WangHuawei International Pte Ltd, SingaporeEmail verificata su huawei.com
- Man Ho AuProfessor, The Hong Kong Polytechnic UniversityEmail verificata su comp.polyu.edu.hk
- Xuechao YangCollege of ABLE&IT, Victoria UniversityEmail verificata su vu.edu.au
- Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityEmail verificata su monash.edu
- Yinghui ZhangXUPT & SMUEmail verificata su smu.edu.sg
- Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityEmail verificata su rmit.edu.au
- Wencheng YangUniversity of Southern QueenslandEmail verificata su usq.edu.au
- Jian WengProfessor, College of Cyber Security, Jinan UniversityEmail verificata su jnu.edu.cn
- Xuhua DingSingapore Management UniversityEmail verificata su smu.edu.sg
- Fuchun GuoUniversity of WollongongEmail verificata su uow.edu.au
- Willy SusiloDistinguished Professor and IEEE Fellow (Computer Society), University of WollongongEmail verificata su uow.edu.au
- Falko DresslerTechnische Universität BerlinEmail verificata su ccs-labs.org
- Xiuzhen ChengSchool of Computer Science and Technology, Shandong UniversityEmail verificata su sdu.edu.cn
- Andrei KelarevRMIT UniversityEmail verificata su rmit.edu.au